Skip to main content

Showing 1–8 of 8 results for author: Hester, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.09611  [pdf, other

    cs.HC

    Recy-ctronics: Designing Fully Recyclable Electronics With Varied Form Factors

    Authors: Tingyu Cheng, Zhihan Zhang, Han Huang, Yingting Gao, Wei Sun, Gregory D. Abowd, HyunJoo Oh, Josiah Hester

    Abstract: For today's electronics manufacturing process, the emphasis on stable functionality, durability, and fixed physical forms is designed to ensure long-term usability. However, this focus on robustness and permanence complicates the disassembly and recycling processes, leading to significant environmental repercussions. In this paper, we present three approaches that leverage easily recyclable materi… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  2. arXiv:2310.08778  [pdf, other

    cs.RO eess.SY

    3D Self-Localization of Drones using a Single Millimeter-Wave Anchor

    Authors: Maisy Lam, Laura Dodds, Aline Eid, Jimmy Hester, Fadel Adib

    Abstract: We present the design, implementation, and evaluation of MiFly, a self-localization system for autonomous drones that works across indoor and outdoor environments, including low-visibility, dark, and GPS-denied settings. MiFly performs 6DoF self-localization by leveraging a single millimeter-wave (mmWave) anchor in its vicinity - even if that anchor is visually occluded. MmWave signals are used in… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  3. arXiv:2302.14038  [pdf, other

    cs.FL cs.LG

    Revisiting Variable Ordering for Real Quantifier Elimination using Machine Learning

    Authors: John Hester, Briland Hitaj, Grant Passmore, Sam Owre, Natarajan Shankar, Eric Yeh

    Abstract: Cylindrical Algebraic Decomposition (CAD) is a key proof technique for formal verification of cyber-physical systems. CAD is computationally expensive, with worst-case doubly-exponential complexity. Selecting an optimal variable ordering is paramount to efficient use of CAD. Prior work has demonstrated that machine learning can be useful in determining efficient variable orderings. Much of this wo… ▽ More

    Submitted 27 February, 2023; originally announced February 2023.

    Comments: 7 pages, 1 figure, 2 tables

  4. Augmented Reality's Potential for Identifying and Mitigating Home Privacy Leaks

    Authors: Stefany Cruz, Logan Danek, Shinan Liu, Christopher Kraemer, Zixin Wang, Nick Feamster, Danny Yuxing Huang, Yaxing Yao, Josiah Hester

    Abstract: Users face various privacy risks in smart homes, yet there are limited ways for them to learn about the details of such risks, such as the data practices of smart home devices and their data flow. In this paper, we present Privacy Plumber, a system that enables a user to inspect and explore the privacy "leaks" in their home using an augmented reality tool. Privacy Plumber allows the user to learn… ▽ More

    Submitted 27 January, 2023; originally announced January 2023.

    Journal ref: Workshop on Usable Security and Privacy (USEC) 2023

  5. arXiv:2109.13834  [pdf, other

    cs.CR

    Touchtone leakage attacks via smartphone sensors: mitigation without hardware modification

    Authors: Connor Bolton, Yan Long, Jun Han, Josiah Hester, Kevin Fu

    Abstract: Smartphone motion sensors provide a concealed mechanism for eavesdrop** on acoustic information, like touchtones, emitted by a device. Eavesdrop** on touchtones exposes credit card information, banking pins, and social security card numbers to malicious 3rd party apps requiring only motion sensor data. This paper's primary contribution is an analysis rooted in physics and signal processing the… ▽ More

    Submitted 28 September, 2021; originally announced September 2021.

  6. arXiv:2103.05579  [pdf, other

    cs.LG cs.AR physics.ins-det

    hls4ml: An Open-Source Codesign Workflow to Empower Scientific Low-Power Machine Learning Devices

    Authors: Farah Fahim, Benjamin Hawks, Christian Herwig, James Hirschauer, Sergo **dariani, Nhan Tran, Luca P. Carloni, Giuseppe Di Guglielmo, Philip Harris, Jeffrey Krupa, Dylan Rankin, Manuel Blanco Valentin, Josiah Hester, Yingyi Luo, John Mamish, Seda Orgrenci-Memik, Thea Aarrestad, Hamza Javed, Vladimir Loncar, Maurizio Pierini, Adrian Alan Pol, Sioni Summers, Javier Duarte, Scott Hauck, Shih-Chieh Hsu , et al. (5 additional authors not shown)

    Abstract: Accessible machine learning algorithms, software, and diagnostic tools for energy-efficient devices and systems are extremely valuable across a broad range of application domains. In scientific domains, real-time near-sensor processing can drastically improve experimental design and accelerate scientific discoveries. To support domain scientists, we have developed hls4ml, an open-source software-h… ▽ More

    Submitted 23 March, 2021; v1 submitted 9 March, 2021; originally announced March 2021.

    Comments: 10 pages, 8 figures, TinyML Research Symposium 2021

    Report number: FERMILAB-CONF-21-080-SCD

  7. arXiv:1911.07179  [pdf, other

    cs.HC cs.LG

    NeckSense: A Multi-Sensor Necklace for Detecting Eating Activities in Free-Living Conditions

    Authors: Shibo Zhang, Yuqi Zhao, Dzung Tri Nguyen, Runsheng Xu, Sougata Sen, Josiah Hester, Nabil Alshurafa

    Abstract: We present the design, implementation, and evaluation of a multi-sensor low-power necklace 'NeckSense' for automatically and unobtrusively capturing fine-grained information about an individual's eating activity and eating episodes, across an entire waking-day in a naturalistic setting. The NeckSense fuses and classifies the proximity of the necklace from the chin, the ambient light, the Lean Forw… ▽ More

    Submitted 20 November, 2019; v1 submitted 17 November, 2019; originally announced November 2019.

    Comments: 21 pages, 15 figures

  8. arXiv:1902.00818  [pdf, other

    cs.LO

    Automated ZFC Theorem Proving with E

    Authors: John Hester

    Abstract: I introduce an approach for automated reasoning in first order set theories that are not finitely axiomatizable, such as $ZFC$, and describe its implementation alongside the automated theorem proving software E. I then compare the results of proof search in the class based set theory $NBG$ with those of $ZFC$.

    Submitted 2 February, 2019; originally announced February 2019.